/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpa-psk-tkip.conf | 1 # WPA-PSK/TKIP 6 ssid="example wpa-psk network" 7 key_mgmt=WPA-PSK 11 psk="secret passphrase"
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.h | 22 struct hostapd_sta_wpa_psk_short **psk, 26 void hostapd_free_psk_list(struct hostapd_sta_wpa_psk_short *psk);
|
ap_config.c | 202 struct hostapd_wpa_psk *psk; local 209 wpa_printf(MSG_ERROR, "WPA PSK file '%s' not found.", fname); 236 psk = os_zalloc(sizeof(*psk)); 237 if (psk == NULL) { 238 wpa_printf(MSG_ERROR, "WPA PSK allocation failed"); 243 psk->group = 1; 245 os_memcpy(psk->addr, addr, ETH_ALEN); 249 wpa_printf(MSG_ERROR, "No PSK on line %d in '%s'", 251 os_free(psk); 402 struct hostapd_wpa_psk *psk, *prev; local 631 struct hostapd_wpa_psk *psk; local [all...] |
ieee802_11_auth.c | 39 struct hostapd_sta_wpa_psk_short *psk; member in struct:hostapd_cached_radius_acl 60 hostapd_free_psk_list(e->psk); 77 static void copy_psk_list(struct hostapd_sta_wpa_psk_short **psk, 83 /* Copy PSK linked list */ 84 copy_to = psk; 103 struct hostapd_sta_wpa_psk_short **psk, 125 copy_psk_list(psk, entry->psk); 223 * @psk: Linked list buffer for returning WPA PSK 426 struct hostapd_sta_wpa_psk_short *psk; local [all...] |
wpa_auth_glue.c | 194 const u8 *psk; local 204 psk = hostapd_get_psk(hapd->conf, addr, p2p_dev_addr, prev_psk); 207 * returned psk which should not be returned again. 208 * logic list (all hostapd_get_psk; all sta->psk) 210 if (sta && sta->psk && !psk) { 212 psk = sta->psk->psk; 213 for (pos = sta->psk; pos; pos = pos->next) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 2 * WPA Supplicant - ASCII passphrase to WPA PSK tool 17 unsigned char psk[32]; local 55 pbkdf2_sha1(passphrase, (u8 *) ssid, os_strlen(ssid), 4096, psk, 32); local 59 printf("\t#psk=\"%s\"\n", passphrase); 62 printf("%02x", psk[i]);
|
wpa_supplicant.conf | 511 # both), and psk must also be set. 557 # WPA-PSK = WPA pre-shared key (this requires 'psk' field) 562 # WPA-PSK-SHA256 = Like WPA-PSK but using stronger SHA256-based algorithms 564 # If not set, this defaults to: WPA-PSK WPA-EAP 574 # (and similarly for WPA-PSK and WPA-WPSK-SHA256 if WPA2-Personal is used) 597 # psk: WPA preshared key; 256-bit pre-shared key 598 # The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e., 599 # 32 bytes or as an ASCII passphrase (in which case, the real PSK will b [all...] |
ibss_rsn.h | 50 u8 psk[PMK_LEN]; member in struct:ibss_rsn 60 void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
|
config_ssid.h | 40 u8 psk[32]; member in struct:psk_list_entry 134 * psk - WPA pre-shared key (256 bits) 136 u8 psk[32]; member in struct:wpa_ssid 139 * psk_set - Whether PSK field is configured 146 * If this is set, psk will be generated using the SSID and passphrase 153 * ext_psk - PSK/passphrase name in external storage 155 * If this is set, PSK/passphrase will be fetched from external storage 317 * pairwise=NONE, group=TKIP (or CCMP, but not both), and psk must also
|
p2p_supplicant.c | 615 os_memcpy(s->psk, ssid->psk, 32); 788 char psk[65]; local 789 wpa_snprintf_hex(psk, sizeof(psk), ssid->psk, 32); 791 "%s GO ssid=\"%s\" freq=%d psk=%s go_dev_addr=" 793 wpa_s->ifname, ssid_txt, ssid->frequency, psk, 926 struct psk_list_entry *psk; local 939 dl_list_for_each(psk, &persistent->psk_list, struct psk_list_entry 984 char psk[65]; local 5277 char psk[65]; local 6120 struct psk_list_entry *psk, *tmp; local 6262 struct hostapd_wpa_psk *psk, *prev, *rem; local [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_psk_common.c | 2 * EAP server/peer: EAP-PSK shared routines 19 int eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk) 22 if (aes_128_encrypt_block(psk, ak, ak)) 27 if (aes_128_encrypt_block(psk, ak, ak) || 28 aes_128_encrypt_block(psk, kdk, kdk))
|
eap_gpsk_common.c | 38 static int eap_gpsk_gkdf_cmac(const u8 *psk /* Y */, 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 73 static int eap_gpsk_gkdf_sha256(const u8 *psk /* Y */, 95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); 109 const u8 *psk, size_t psk_len, 146 os_memcpy(pos, psk, psk_len); 156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 188 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, 202 * MK = GKDF-16 (PSK[0..15], PL || PSK || CSuite_Sel || inputString [all...] |
eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
eap_psk_common.h | 2 * EAP server/peer: EAP-PSK shared routines 32 /* EAP-PSK First Message (AS -> Supplicant) */ 39 /* EAP-PSK Second Message (Supplicant -> AS) */ 48 /* EAP-PSK Third Message (AS -> Supplicant) */ 56 /* EAP-PSK Fourth Message (Supplicant -> AS) */ 68 int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
|
/system/netd/ |
SoftapController.h | 42 void generatePsk(char *ssid, char *passphrase, char *psk);
|
SoftapController.cpp | 126 ALOGE("softap <wlan iface> <SSID> <hidden/broadcast> <channel> <wpa2?-psk|open> <passphrase>"); 145 if (!strcmp(argv[6], "wpa-psk")) { 148 } else if (!strcmp(argv[6], "wpa2-psk")) { 232 unsigned char psk[SHA256_DIGEST_LENGTH]; local 237 4096, SHA256_DIGEST_LENGTH, psk); 239 sprintf(&psk_str[j*2], "%02x", psk[j]);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 2 * hostapd / EAP-PSK (RFC 4764) server 8 * Note: EAP-PSK is an EAP authentication method and as such, completely 9 * different from WPA-PSK. This file is not needed for WPA-PSK functionality. 58 struct eap_psk_hdr_1 *psk; local 60 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)"); 63 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data"); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 71 sizeof(*psk) + sm->server_id_len 93 struct eap_psk_hdr_3 *psk; local [all...] |
/frameworks/av/media/libstagefright/codecs/amrnb/enc/src/ |
c2_11pf.cpp | 418 Word16 psk; local 435 psk = -1; 521 /* s = L_msu(s, psk, alp, pOverflow); */ 522 s -= (((Word32) psk * alp) << 1); 526 psk = sq;
|
c2_9pf.cpp | 482 Word16 psk, ps0, ps1, sq, sq1; 487 psk = -1; 550 s = L_msu(L_mult(alpk, sq), psk, alp); 553 psk = sq; 600 Word16 psk; local 617 psk = -1; 711 /* s = L_msu(L_temp, psk, alp, pOverflow); */ 712 s = L_temp - (((Word32) psk * alp) << 1); 716 psk = sq; [all...] |
c3_14pf.cpp | 394 Word16 psk; local 409 psk = -1; 567 s = L_msu(s, psk, alp, pOverflow); 568 //s -= (((Word32) psk * alp) << 1); 572 psk = sq;
|
c4_17pf.cpp | 407 Word16 psk; local 425 psk = -1; 632 /* s = L_msu(s, psk, alp, pOverflow); */ 633 s -= (((Word32) psk * alp) << 1); 637 psk = sq;
|
s10_8pf.cpp | 192 Word16 psk, ps, ps0, ps1, ps2, sq, sq2; 217 psk = -1; 494 s = L_msu (L_mult (alpk, sq), psk, alp); 498 psk = sq; 571 Word16 psk; local 608 psk = -1; 963 if (((Word32) alpk * sq) > ((Word32) psk * alp)) 965 psk = sq;
|
/frameworks/av/media/libstagefright/codecs/amrwbenc/src/ |
c2t64fx.c | 57 Word16 ps, psk, ps1, ps2, alpk, alp1, alp2, sq; local 227 psk = -1; 242 s = vo_L_mult(alpk, sq) - ((psk * alp2)<<1); 245 psk = sq;
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 27 u8 psk[PMK_LEN]; member in struct:wpa 198 wpa_sm_set_pmk(wpa->supp, wpa->psk, PMK_LEN); 264 return wpa->psk; 343 os_memset(wpa.psk, 0x44, PMK_LEN);
|
/external/ipsec-tools/src/racoon/ |
privsep.c | 468 vchar_t *psk; local 486 if ((psk = getpsk(bufs[0], keylen)) == NULL) { 491 reply->bufs.buflen[0] = psk->l; 492 reply->hdr.ac_len = sizeof(*reply) + psk->l; 501 memcpy(reply + 1, psk->v, psk->l); 502 vfree(psk); 894 vchar_t *psk; local 932 if ((psk = vmalloc(len - sizeof(*msg))) == NULL) 935 memcpy(psk->v, msg + 1, psk->l) [all...] |